Forgot - HTB [Discussion]
by - Thursday, January 1, 1970 at 12:00 AM
Good luck everyone.

Reply
any progress?
Reply
there's a python webserver with /forgot, /reset, and /escalate directories. also I see that it's using varnish-cache 6.2 so it might be vulnerable to CVE-2021-36740. full port scan pulled up nothing but ssh and the webserver
Reply
(November 12, 2022, 08:00 PM)movfuscate Wrote: there's a python webserver with /forgot, /reset, and /escalate directories. also I see that it's using varnish-cache 6.2 so it might be vulnerable to CVE-2021-36740. full port scan pulled up nothing but ssh and the webserver


but how you do ssh to webserver???
Reply
(November 12, 2022, 08:10 PM)pingu27 Wrote:
(November 12, 2022, 08:00 PM)movfuscate Wrote: there's a python webserver with /forgot, /reset, and /escalate directories. also I see that it's using varnish-cache 6.2 so it might be vulnerable to CVE-2021-36740. full port scan pulled up nothing but ssh and the webserver


but how you do ssh to webserver???


Scanning the box with nmap shows port 22 is open, you can't authenticate to it unless you know the password or have the rsa key.
Reply
(November 12, 2022, 08:19 PM)movfuscate Wrote:
(November 12, 2022, 08:10 PM)pingu27 Wrote:
(November 12, 2022, 08:00 PM)movfuscate Wrote: there's a python webserver with /forgot, /reset, and /escalate directories. also I see that it's using varnish-cache 6.2 so it might be vulnerable to CVE-2021-36740. full port scan pulled up nothing but ssh and the webserver


but how you do ssh to webserver???


Scanning the box with nmap shows port 22 is open, you can't authenticate to it unless you know the password or have the rsa key.


i know that. i thought you got a shell....
Reply
Apart from bruteforcing the basic auth with robert-dev-10090 (from source code) I don't know what to do.
No XSS for CSRF, no flask token generation since we don't even have a token to spoof, no SQLi so far, fuzzing didn't got me anything juicy... Hitting the wall atm
Reply
(November 12, 2022, 08:32 PM)annehathaway Wrote: Apart from bruteforcing the basic auth with robert-dev-10090 (from source code) I don't know what to do.
No XSS for CSRF, no flask token generation since we don't even have a token to spoof, no SQLi so far, fuzzing didn't got me anything juicy... Hitting the wall atm


Have you done brute force yet? it worked?
Reply
(November 12, 2022, 08:57 PM)may123a Wrote:
(November 12, 2022, 08:32 PM)annehathaway Wrote: Apart from bruteforcing the basic auth with robert-dev-10090 (from source code) I don't know what to do.
No XSS for CSRF, no flask token generation since we don't even have a token to spoof, no SQLi so far, fuzzing didn't got me anything juicy... Hitting the wall atm


Have you done brute force yet? it worked?


I quitted bf pretty sure that's not that way... Also that's weird we don't have a domain.htb to update /etc/hosts and check for a vhost. Pretty limited tbh
Reply
https://portswigger.net/web-security/host-header/exploiting/password-reset-poisoningI can get the token and reset the robert-dev- account (gives "Success")but trying to login still gives invalid credsIt might be http smuggling with the post request to /reset after getting a token but when I do that I break the box ... everything gives 500 error
Reply


 Users viewing this thread: Forgot - HTB [Discussion]: No users currently viewing.